a call to a base class is constructor (with parameters) is specified in the heading of the definition of the derived class's main function.

Answers

Answer 1

When a derived class is defined with a parameterized constructor, a call to the base class's constructor with appropriate parameters must be specified in the heading of the derived class's main function definition using the base keyword to ensure proper initialization of the base class's properties and behavior.

What is the purpose of specifying a call to the base class's constructor with appropriate parameters in the heading of a derived class's main function definition?

When a derived class is defined with a parameterized constructor, a call to the base class's parameterized constructor is specified in the heading of the derived class's main function definition.

In object-oriented programming, a derived class is a class that inherits properties and behavior from a base class.

When a derived class is defined, it can either use the default constructor of the base class or specify its own parameterized constructor.

If the derived class has a parameterized constructor, it must explicitly call the base class's constructor with the appropriate arguments.

The call to the base class's constructor is made using the base keyword followed by the constructor parameters in parentheses.

This ensures that the base class's constructor is called before the derived class's constructor, and that the base class's properties and behavior are properly initialized.

For example, consider the following code snippet:

```

class BaseClass

{

public:

   BaseClass(int value) { /ˣ Constructor implementation ˣ/ }

};

class DerivedClass : public BaseClass

{

public:

   DerivedClass(int value) : BaseClass(value) { /ˣ Constructor implementation */ }

};

```

In this example, the DerivedClass is defined with a parameterized constructor that takes an integer value.

The constructor calls the BaseClass constructor with the same integer value using the base keyword, ensuring that the BaseClass is properly initialized before the DerivedClass constructor is executed.

In summary, when a derived class is defined with a parameterized constructor, a call to the base class's parameterized constructor must be specified in the heading of the derived class's main function definition using the base keyword and appropriate constructor parameters.

Learn more about parameterized constructor

brainly.com/question/29744767

#SPJ11


Related Questions

[Files, for loops, exceptions; 20pt] Using a for loop, write a function called countWord(). It takes 2 parameters: The name of a text file (e.g. gettysburg.txt that is included with this test) and a word to be searched within that file. Your code should return the number of times the given word appears in the file. Capitalization should not matter. Make certain to handle file exceptions gracefully.

Answers

def countWord(name, word):

   try:

       f = open(name, "r")

       lst = ([])

       w = ""

       for x in f.readlines():

           w += x.lower()

       lst = w.split()

       f.close()

       return lst.count(word)

   except FileNotFoundError:

       print("Please create a file or use the name of an existing text file.")

print("Your word appears", countWord("gettysburg.txt", "random"), "time(s)")

The text file I used for testing looks like:

random words

random words

I'm putting random words in here

random

this is random

RaNdOm

I didn't really know what exceptions your professor is looking for so I just used the file not found one. Best of luck.

Create a class called Drive. It should have instance fields miles and gas which are both integers. Another instance field, carType, is a String. The constructor should receive a String which initializes carType. The other two instance fields are both automatically initialized to 1 in the constructor. Create a method called getGas that returns an integer that is the gas data member. The getGas method has no parameters. Write in java. First correct answer will be marked brainliest, i need answer very soon

Answers

public class JavaApplication87 {

   

   public static void main(String[] args) {

       Drive dr = new Drive("Insert type of car");

       System.out.println(dr.carType);

   }

   

}

class Drive{

   int miles;

   int gas;

   String carType;

   public Drive(String ct){

       carType = ct;

       miles = 1;

       gas = 1;

       

   }

   int getGas(){

       return gas;

   }

   

}

I'm pretty sure this is what you're looking for. Best of luck.

Interpret consider the stanza that begins "and this was the way of it," (lines 42-52). who are the two speakers in the stanza, and how do the rhythms of their speech reflect the differences in their attitudes?"

Answers

The two speakers in the stanza are the narrator and Tam Lin, the rhythms of their speech can be different in regard to the story that they delivered.

A stanza is a grouping of lines in a poem, usually separated by a line break.

In the stanza that begins "and this was the way of it," (lines 42-52), there are two speakers: the narrator and the old sailor. The narrator sets the scene by describing the old sailor's story and then the old sailor takes over to recount his experience.

The rhythms of their speech reflect the differences in their attitudes. The narrator's speech is steady and measured, reflecting a sense of objectivity and detachment. In contrast, the old sailor's speech is more animated and rhythmic, reflecting his passion and excitement for the story he is telling. The old sailor's use of repetition and alliteration ("blast," "black," "back") adds to the rhythm of his speech and emphasizes the intensity of his experience.

Overall, the different rhythms of the two speakers highlight their distinct perspectives and attitudes toward the story being told. The contrast between the narrator's objective tone and Tam Lin's emotional outburst highlights the tension and drama of the scene.


To know more about Rhythm of the Stanza visit:

https://brainly.com/question/30982746

#SPJ11

a company is considering a serverless architecture and wants to build and run applications without having to manage infrastructure. which aws services should the company consider using when building applications?.

Answers

The company should consider using AWS Lambda and AWS API Gateway when building applications with serverless architecture.

If a company is considering a serverless architecture and wants to build and run applications without having to manage infrastructure, they should consider using AWS services such as AWS Lambda, Amazon API Gateway, AWS Step Functions, Amazon S3, and Amazon DynamoDB. By leveraging these AWS services, the company can build and deploy its applications easily and efficiently, without worrying about managing servers or infrastructure. This can result in cost savings and improved scalability for the company's applications. These services allow them to build and run applications without having to manage infrastructure, as AWS automatically handles the scaling, patching, and operational aspects.

Learn more AWS about here :

https://brainly.com/question/30762084

#SPJ11

Drag the tiles to the correct boxes to complete the pairs.
Match the effects with the result they have.
silky blur
grainy BMW effect
soft focus
zoom effect
blurs an image while maintaining sharp edges
simulates flow of water
shows motion lines around the main object
obtains a darker, textured finish

Answers

Silky blur::shows motion lines around the main objectgrainy BMW effect:-obtains a darker, textured finishsoft focus:-blurs an image while maintaining sharp edgeszoom effect:-simulates flow of water

Done

Answer:

1 : blurs an image while maintaining sharp edges = soft focus

2:  simulates flow of water = silky blur

3: shows motion lines around the main object = zoom effect

4:  obtains a darker, textured finish = grainy B/W effect

Explanation:

Drag the tiles to the correct boxes to complete the pairs.Match the effects with the result they have.silky

expressions that yield variant data-type cannot be used to define calculated columns.

Answers

A Variant is a unique type of data that may hold any sort of information except for fixed-length String data.

What is use of Variant data type?Variables that contain any kind of data may be defined using the variation data type. To indicate the kind of data the variation data presently includes, a tag is saved with it. The VarType method may be used to inspect the tag.The Variant data type has a character storage size of 22 bytes (plus string length) and may store any character text. It has a numeric storage size of 16 bytes and can store data up to a Decimal range.If you don't provide a data type when you declare a constant, variable, or argument, the Variant data type is automatically specified. Variables with the Variant data type specified can automatically transform the values they contain and hold text, date, time, Boolean, or numeric data.

Explanation :

Calculated columns are computed once, when you load the data, and stored in your model. They are strongly typed, e.g. number. Your expression returns either Amount (number) or "gift" (text). This means that some of the rows in your data must be numbers, while others must be texts. But all values in one column must have the same data type. So your expression is invalid for this use case. You must re-evaluate your design.

Learn more about data types refer to :

https://brainly.com/question/26352522

#SPJ4


Which character is often used to identify registered trademarks and is available on the Insert tab and Symbols group?

Answers

Answer:"TM"

Explanation:

Answer:

TM

Explanation:

because its used to identify, trademarks and etc. mark brainliest! i also got 100 on the quiz

title v of the irtpa deals with border security. what changes were made? are these changes being implemented effectively? are our borders secure?

Answers

Title V of the Intelligence Reform and Terrorism Prevention Act (IRTPA), the law was enacted in December 2004 and made some changes to improve border security.

Among the changes were the establishment of new border patrol agents, the deployment of new technologies to improve border surveillance, and measures to strengthen visa application and control processes.

The effectiveness of these changes is the subject of debate and controversy. While some experts argue that these measures have improved border security, others believe that more needs to be done to address the problem.

Overall, it is difficult to say definitively whether our borders are completely secure, but progress has been made in recent years to improve security measures.

Learn more about Intelligence Reform and Terrorism Prevention:

https://brainly.com/question/30313017

#SPJ11

Give three examples of the following types of data?
Give three examples for each category in the software domain ?

CCDI :)??

Give three examples of the following types of data?Give three examples for each category in the software
Give three examples of the following types of data?Give three examples for each category in the software

Answers

An example of transactional data are:

Sales ordersPurchase ordersShipping documents

Its software domain are: Personal  meeting, a telephone call, and a Video call

An example of  financial data are: assets, liabilities, and equity. The software are: CORE Banking, Retail Banking, and Private banking

An example of intellectual property data are: books, music, inventions. The software domain are Patents, trademarks, and copyrights

What types of software are used in the financial industry?

Through sales and marketing tools, data-driven contact management, and workflow automation, customer relationship management (CRM) software assists financial services organizations in fostering new relationships and maximizing the value of existing customers.

You can see how your consumers are utilizing your website to complete a transaction by using transaction management software. It may demonstrate both how each website element functions on its own and as a part of the overall technological infrastructure.

Note that Information that is gathered from transactions is referred to as transactional data. It keeps track of the date and location of the transaction, the time it took place, the price ranges of the goods purchased, the mode of payment used, any discounts applied, and other quantities and characteristics related to the transaction.

Learn more about transactional data  from

https://brainly.com/question/28081430
#SPJ1

Which of the following best describes the average amount of stored data per user for the first eight years of the application existence

Answers

The option that best describes the average amount of stored data per user for the first eight years of the application existence is memory.

What is  RAM memory?

The memory of a system is known to bee RAM which is Random Access Memory.

Conclusively, This is known to be  a part of system hardware where operating system (OS), and data are saved. The option that best describes the average amount of stored data per user for the first eight years of the application existence is memory.

Learn more about data from

https://brainly.com/question/19243813

#SPJ1

can you fart and burp at the same time?

Answers

Answer:

Yes you can

Explanation:

Although farting and burping at the same time is a very rare phenomenon, it’s very possible. When this happens at the same time it is usually called a Furp.

This occurrence usually happens when there’s a lot of intake of foods which have a large percentage of gas . These gases often need to be expelled through processes such as burping and farting.

which arithmetic instruction takes more than 1 clock cycle: group of answer choices add shift subtract multiply

Answers

The arithmetic instruction that takes more than one clock cycle is multiply.

Multiplication is a more complex arithmetic operation than addition, subtraction, or shifting, as it involves multiple steps to compute the product of two values.

Multiplying two numbers involves a series of steps. Firstly, the two numbers have to be read into the processor's register.

Then, the numbers are multiplied, which requires multiple clock cycles. After that, the result is written back to the register, which takes another clock cycle.

Finally, the result is stored in memory, which takes one more clock cycle.

Learn more about  arithmetic instruction here:

https://brainly.com/question/30955673

#SPJ11

Write a java program that uses a stack to reverse an integer of three digits. The program must prompt the user to input an integer of 3 digits and display it in reverse.

Answers

Answer:

import java.util.*;  

class Main {

 public static void main(String[] args) {

   Scanner sc = new Scanner(System.in);

   System.out.print("Enter a number: ");

   String str = sc.nextLine();

   System.out.print("You have entered: " + str + "\n");

   Stack stk = new Stack();  

   for (int i = 0; i < str.length(); i++) {

     stk.push(str.charAt(i));

   }

   String reversed = "";

   while(!stk.empty()) {

     reversed += stk.pop();

   }

   System.out.print("Reversed this is: " + reversed + "\n");

 }

}

Explanation:

This solution works for all types of input of all lengths.

If needed you could rework it for just integers.

embedded systems that must place priority on processing data as it arrives rather than using interrupts or other waiting techniques are likely to utilize which type of operating system?

Answers

Embedded systems that prioritize processing data as it arrives rather than waiting for interrupts or other techniques are likely to use a real-time operating system (RTOS).

Real-time operating systems are designed to provide predictable response times to events, which is crucial for systems that need to process data as it arrives without delay. These operating systems are optimized for handling time-critical tasks and have minimal overhead, making them ideal for embedded systems with limited resources. RTOSs use a preemptive scheduling algorithm to prioritize tasks and ensure that time-sensitive tasks are completed before non-critical tasks. This allows the system to quickly respond to incoming data without interruptions or delays.

In conclusion, embedded systems that prioritize processing data as it arrives are likely to use a real-time operating system due to its ability to provide predictable response times and handle time-critical tasks efficiently.

To know more about scheduling algorithm visit:
https://brainly.com/question/28501187
#SPJ11

Which of the following scenarios best shows the relationship between art, commerce, and technology?


A stage director wants to develop a show that is entirely digital, except for the actors. The set will be created using 3D images projected from a state-of-the-art system. Music will be recorded and played over a digital sound system and special effects will be created using brand new software.

An artist wants to create a mural of the Statue of Liberty using individual images of Americans from across the country. She needs a software program that will allow her to take, edit, and store files, as well as software that will create her mural.

A feature-film director needs to increase sales of his movie in order to please his film studio. The artist works with a multimedia artist to rebrand the film and build a bigger following on social media.

A musician has signed a deal with a record label to create an entirely digital album using digitally created instruments and background vocals. The first tracks are not producing a realistic sound. The artist works with a multimedia artist to develop software that will create the appropriate sound and fulfill the musician’s contract.

Answers

Answer:

b

Explanation:

i think

With the launch of Windows 10, Microsoft announced that it would publish ongoing, incremental upgrades instead of releasing new versions of the software every few years. However, some IS professionals have opted out of frequent updates because they believe making minimal changes will ensure reliable operations. ​T/F

Answers

Answer:

Explanation:

False.

Some IS professionals may choose to opt out of frequent updates due to concerns about potential disruptions to their systems and operations. However, the statement that making minimal changes will ensure reliable operations is not entirely accurate. While minimizing changes can reduce the risk of introducing new issues or compatibility problems, it can also result in missing out on important security patches, bug fixes, and new features that are included in the updates.

Regular updates are crucial for maintaining the security, stability, and performance of software systems. They often address vulnerabilities, improve compatibility with other software and hardware, and introduce enhancements and optimizations. Therefore, keeping software up to date with the latest updates is generally recommended to ensure reliable and secure operations.

Learn more about launch of windows 10 here:

https://brainly.com/question/31735777

#SPJ11

the trend for firms in regard to country risk assessment cra is to:____\

Answers

The trend for firms in regard to Country Risk Assessment (CRA) is to: proactively evaluate and manage potential risks associated with conducting business in a specific country.

Step-by-step explanation:

1. Identify risks: Firms first identify various types of risks such as political, economic, financial, and legal risks that may affect their operations in a particular country.
2. Gather information: Firms gather information from multiple sources, including government reports, financial institutions, and international agencies, to assess the country's risk profile.
3. Analyze risks: Firms analyze the identified risks, taking into consideration the potential impact on their operations and overall business strategy.
4. Develop risk mitigation strategies: Based on the analysis, firms develop strategies to mitigate or manage the identified risks, such as diversifying their investments or implementing contingency plans.
5. Monitor and update: Firms continuously monitor the country's risk environment and update their CRA to reflect any changes, ensuring that their risk management strategies remain effective.

Know more about country risk assessment here:

https://brainly.com/question/29671719

#SPJ11




For the levels data shown below, make a level noteform. Remove a page from your field book for the notes and submit with this sheet.

Answers

This may vary depending on the type of survey or construction project you are working on, as well as the equipment and methods you are using. It is important to ensure that the noteform is clear and easy to read, as well as accurate and complete.

However, I can give you some general information about data and note-taking that may be helpful.Data is a collection of facts, figures, statistics, or other pieces of information that can be analyzed to gain insight or knowledge about a particular subject or topic. In order to effectively gather and utilize data, it is important to have accurate and organized notes that can be easily referenced and understood.

A noteform is a standardized format for taking notes that allows for consistent recording and organization of information. A level noteform is a specific type of noteform used in surveying or construction to record elevation measurements at different points in an area or structure. It typically includes fields for recording the point name, elevation, and any other relevant data.

To create a level noteform, you will need to determine the specific fields and layout that are appropriate for the data you are recording. This may vary depending on the type of survey or construction project you are working on, as well as the equipment and methods you are using. It is important to ensure that the noteform is clear and easy to read, as well as accurate and complete.

To know more about data visit :

https://brainly.com/question/31680501

#SPJ11

which of the following is an example of information?

Answers

An example of information is a news article. A news article provides factual information about current events, people, places, and things in the world.

It typically includes important details such as who, what, where, when, why, and how. In addition to news articles, other examples of information include reports, statistics, graphs, charts, maps, and data sets.
These sources provide readers with facts and figures that can be used to make informed decisions or draw conclusions about a particular topic or issue. In today's digital age, the amount of information available to people is almost limitless, and it can be accessed through a variety of mediums including the internet, television, radio, newspapers, and magazines.
It is important to be able to evaluate the quality and credibility of the information that is being presented in order to make informed decisions and form opinions.

Learn more about news article here,
https://brainly.com/question/32035401

#SPJ11

Given a rectangular matrix of English lowercase letters board and a string word, your task is to find the number of occurrences of word in the rows(→), columns(↓) and diagonals(↘) of board.
Example
For
board = [['s', 'o', 's', 'o'],
['s', 'o', 'o', 's'],
['s', 's', 's', 's']]
and word = "sos", the output should be solution(board, word) = 3.
There are 2 occurrences of word starting from board[0][0](going → and ↘), and one starting from board[0][2](going ↓).
No other occurrences of word were counted, so the answer is 3.
For
board = [['a', 'a'],
['a', 'a']]
and word = "aa", the output should be
solution(board, word) = 5.
There are 2 horizontal, 2, vertical, and 1 diagonal occurrence of word, for a total of 5.
Input/Output
[execution time limit] 4 seconds (py3)
[input] array.array.char board
A rectangular matrix of lowercase English letters.
Guaranteed constraints:
1 ≤ board.length ≤ 100,
1 ≤ board[0].length ≤ 100,
board[i].length = board[0].length.
[input] string word
A string consisting of lowercase English letters.
Guaranteed constraints:
2 ≤ word.length ≤ 100.
[output] integer
The number of occurrences of word in the rows(→), columns(↓) and diagonals(↘) of board.
PYTHON
def solution(board, word):

Answers

The operation requires a rectangular matrix containing English letters in lowercase and a word input string. The function calculates the frequency of the word in the board's rows, columns, and diagonals. An example is attached.

What is the rectangular matrix  about?

The function counts word occurrences in board's rows, columns, and diagonals from a rectangular matrix board and string word. To solve, the function loops through positions for word in rows, columns, and diagonals of the board. It then checks if there is a match and increments a counter if so

Therefore, the Function uses list function to convert substrings and subsequences to character lists, assumes board is valid rectangular matrix and word has at least 2 characters.

Learn more about  function  from

https://brainly.com/question/11624077

#SPJ1

Given a rectangular matrix of English lowercase letters board and a string word, your task is to find

Read the code snippet below and determine which markup language it is:



Sound Card
Creative Labs
Sound Blaster Live
80.00



The code is an example of the (Blank) markup language.

Answers

Answer:

Sound Card

Explanation:

Please help with my assignment! Use python to do it.

Answers

Answer:

I cant see image

Explanation:

can you type it and I'll try to answer

Which function would you insert to organize large or complex sets of information that are beyond the capabilities of lists?.

Answers

The function that you would insert to organize large or complex sets of information that are beyond the capabilities of lists is known as table.

What is the function of table in database?

All of the data in a database is stored in tables, which are database objects. Data is logically arranged in tables using a row-and-column layout akin to a spreadsheet. Each column denotes a record field, and each row denotes a distinct record.

A user-defined function that returns a table is known as a table function (also known as a table-valued function, or TVF). Anywhere a table may be used, so can a table function. Although a table function can take parameters, it behaves similarly to views.

Note that one can use tables to put together large or complex group of information, that are beyond the power of lists.

Learn more about Table function from

https://brainly.com/question/3632175

#SPJ1

How to start blogging site? Explain in detail each step

Answers

To start a blogging site, define your niche, choose a platform, and set up your blog with a domain name. Customize the design, analyze performance to continuously improve and engage with your audience.

Starting a blogging site involves several key steps. First, define your niche and choose a suitable blogging platform. Register a domain name that reflects your blog's topic and select a reliable web hosting provider. Set up your blog on the chosen platform, customize its design, and create essential pages like About and Contact. Install necessary plugins to enhance functionality, develop a content strategy, and start creating and publishing engaging blog posts. Promote your blog through social media, online communities, and SEO techniques. Engage with your audience by responding to comments and feedback.

Monitor and analyze your blog's performance using analytics tools. Adjust your strategies based on insights to improve your blog's reach and engagement. Remember to consistently produce high-quality content, interact with your audience, and adapt your approach as needed. Building a successful blog takes time, so stay committed and focused on delivering value to your readers.

Learn more about blogging site here:

https://brainly.com/question/32143424

#SPJ11

A threat vector is an item of code on a distributed device that reports the condition of the device to a central server.
a. true
b. false

Answers

Answer:

A threat vector is an item of code on a distributed device that reports the condition of the device to a central server.

a. true

It is true that a threat vector is an item of code on a distributed device that reports the condition of the device to a central server. The correct option is a.

What is a threat vector?

The total number of attack vectors that an attacker can use to manipulate a network or computer system or extract data is referred to as the attack surface.

Threat vector and attack vector are interchangeable terms that describe the various ways a hacker can gain access to data or other confidential information.

The methods used by adversaries to breach or infiltrate your network are referred to as attack vectors.

Malware and ransomware, as well as man-in-the-middle attacks, compromised credentials, and phishing, are all examples of attack vectors.

A threat vector is a piece of code on a distributed device that reports the device's status to a central server.

Thus, the correct option is a.

For more details regarding a threat vector, visit:

https://brainly.com/question/28558110

#SPJ2

How to turn off do not disturb on iphone for a contact.

Answers

Answer:

Okay so you turn your phone on scroll up and it well show everything click the moon and on the side of your phone there is alittle swice turn it right

Explanation:

Answer:

Open Messages App > tap on Conversation of the Contact that you want to Turn OFF Do Not Disturb Mode. On the next screen, tap on the Contact Name or Number and then tap on the “i” (Details) icon. On the next screen, toggle OFF the option for Hide Alerts. Tap on Done to save your settings.

Explanation:

Hope this Helps!

Pls mark me brainliest

Which should you consider when selecting a highlighting color?


Answers

Answer:contrast

Explanation:

To make sure it’s easier to read

Answer:

The answer is D contrast

Explanation:

edg 2020

(Rocks Mineral
When limestone undergoes several changes, it forms
2
(marblelse
PA
For
the
are underground natural resources.
3. Metals are extracted from their
4. Molten rock inside the earth is called
5.
is used in making glass.
L
(magmalla
(Limestone/Sla
Yo
# Science-5​

Answers

Answer:

TENDRIAS QUE PONER LA PREGUNTA MEJOR

Explanation:

A company was asked to develop a smartphone app to help people locate a car of their choice to purchase from a complex of more than thirty used car dealers who all share a huge car lot. Name two features that that would be useful to potential customers.

Answers

Answer:

the gps and a map

Explanation:

Answer:

I think. it could be GPS and maps to but I may be wrong so yeah

Question 4 of 10
which phrase best describes algorithmic bias?
o a. when systematic errors in a program create unfair outcomes
b. when companies avoid using algorithms in their software
c. when programmers purposely create biased software
d. when people insist on doing things without technology

Answers

The phrase that best describes algorithmic bias is that when systematic errors in a program create unfair outcomes.

What is Algorithmic bias?

This is known to be a term that tells about the systematic and repeatable errors as seen in a  computer system that forms "unfair or bad" outcomes.

Therefore, we can say that the phrase that best describes algorithmic bias is that when systematic errors in a program create unfair outcomes.

Learn more about algorithmic bias from

https://brainly.com/question/22236556

#SPJ1

Other Questions
longitudinal research, conducted mostly in the united states, found that approximately of rejected children drop out of school, compared with approximately or less of other children. please choose the correct answer from the following choices, and then select the submit answer button. answer choices 10% to 15%; 8% 40% to 50%; 14% 25% to 30%; 8% 5% to 6%; 3% What is remote sensing? Describe the three remote sensing tools that geographers can use. Between 1946 and 1960, the American gross national product: Group of answer choices declined as wages stagnated. increased so dramatically that poverty was completely eliminated. returned to prewar levels. stayed about the same. more than doubled, and wages increased. How does the strength of the imfs in water compare to the strength of the imfs in ethanol?. What happens to the demand forproducts whenever the price ofasubstitute item decreases? a jet fighter pilot wishes to accelerate from rest at 5 g to reach mach-3 (three times the speed of sound) as quickly as possible. experimental tests reveal that he will black out if this acceleration lasts for more than 4.9 s . use 331 m/s for the speed of sound. Describe the attacks of September 11, 2001, with complete sentences and facts. Includelocations and the number of people involved. Name the extremist group to which theterrorists belonged and the group leader's name. The movement of matter across a cell membrane against a concentration difference is called , and it requires. neuropsychologists are extremely helpful in establishing a baseline of functioning for patients for a variety of disorders. these baselines can be used in the future to: w(-1,4) and (0, -1)write a linear equation Mr Van Rooyen is 41 years of age. He resigned from his present employer on 31 May of the current year. An amount of R800 000 was paid from his employer's pension fund of which R70 500 was never allowed in terms of section 11 F, (current pension fund contribution) as deductions when calculating his taxable income over the years. He spent R 160000 on an overseas trip and invested the rest in shares on the JSE. He also received a salary of R40 000 from the employer that he resigned from. He received R300 000 from his new employer (Assume these amounts to be the taxable portion of the salaries). The total amount of employee's tax withheld from both employers amounted to R52 000. Required: 1. Calculate the tax payable on his lumpsum upon the resignation from his employer. 2. Calculate the normal tax liability on his income tax The fee earned by a servicer in exchange for administering a loan for an investor is called the:A. Investor income feeB. Servicing feeC. Incentive feeD. Float revenue I don't know if I'm right or not. I think it's C, but I'm not too sure. 70 lies between two numbers that eachhave one decimal place.Work out these two numbers. How did the Santa Fe, El Camino Real, and Spanish trails affect the economy and development of New Mexico?[tex]5 - 8 \times 4 \div 7 \times 1 - 7 + 85 - 2 \times 5 \div 0 { < > 461 \times \frac{?}{?} }^{?} [/tex] Which correctly represents the statement, the product of 4 and a number, n, subtracted from 10? the majority of neandertal fossils have been found in . a. india b. africa c. europe d. asia Suppose a person had type O blood. Which antibodies would be in their plasma? Select all that apply Anti-A antibodies Anti-B antibodies Anti-Rh antibodies Earning enough money to take a vacation is which rewards of work factor Which reference materials would probably not be helpful for the following assignment? Select all that apply.Jill has been assigned to create a slide show about the Amazon River.bibliographyperiodicalthesaurusdictionarygazetteerlibrariantelephone directoryvertical fileencyclopediabiographiesmusic index